$45.00 per VM per month base cost, plus $4.50 per virtual CPU (vcpu) per month. $0.16 per GB Disk Storage per month

Size: px
Start display at page:

Download "$45.00 per VM per month base cost, plus $4.50 per virtual CPU (vcpu) per month. $0.16 per GB Disk Storage per month"

Transcription

1 Information Johns Hopkins Enterprise Technology Services (ETS) Systems Management Service Level Agreement February 2015 (rates effective FY16) Information Technology at Johns Hopkins (IT@JH) is a full service IT organization serving the Johns Hopkins Institutions. The organization is responsible for a wide range of centrally funded IT services that benefit the entire Johns Hopkins Institutions. In addition, the organization provides fee based services for departments and divisions. This document describes how departments, divisions, schools and projects can obtain server, data storage and related services. Contents Overview... 2 Service Offerings... 2 Service Offering Matrix... 2 How to Obtain Systems Management Services... 3 Johns Hopkins IT Policies, Standards and Guidelines... 3 Service Variations & Exceptions... 3 Service Offerings and Key Service Level Responsibilities... 3 Managed Services... 3 Cloud Server and Storage Infrastructure... 4 Agreement... 4 Infrastructure Services Detail... 5 Detailed Service Level Terms... 7 Help Desk / On call Teams... 7 Documentation Requirements... 7 Response & Recovery Times... 7 Backup & Restore Services... 7 Delegation of Technical Administrative Rights... 8 Administrator or Root Access, Remote Access... 8 Domain & Directory Services... 8 Security Scans, Systems Management... 8 Alerting & Monitoring... 9 Risk Management & Disaster Planning... 9 Change Management Practices... 9 Data Center Environment Licenses Legacy & Unsupported Systems Capabilities Service Offering In Depth Overview of Offered Services (need to refine) System Administrator involvement in application loads and upgrades Coordination of security, firewall and intrusion detection with network security Installation and Configuration of Server Hardware and OS Account Management Patches and Upgrades License Management rd Party Software Legacy Systems Support Appendix: Enterprise Web Services Appendix: Customer Managed (Hosted) Systems Server Virtualization Team Page 1

2 Storage / Data Protection Team Appendix: Storage Offering Details Appendix: Virtual Desktop Offering Appendix: Citrix XenApp Application Virtualization Appendix: Useful IT@JH contacts Appendix: Midrange Team Overview The most effective way to use IT@JH infrastructure services is by subscribing to a Managed Service offering. These services provide a complete systems management solution, adhering to all JH policies, guidelines and best practices. These services are especially critical when protected information or external access is required. The Enterprise Technology Services division of IT@JH manages IT services infrastructure. The groups involved in systems management are responsible for building and managing highly reliable, secure systems for the greater Johns Hopkins community, at the lowest possible cost. A highly trained staff of experienced professionals are available for support, consultation and proactive systems management. Many services are available through simple transactions, and in some cases through a web based self service system. In other cases, a technical contact or manager assists in providing services and resources. Service Offerings IT@JH provides the following systems management services: Enterprise systems used by all of Johns Hopkins, managed to the highest levels of availability. Systems critical to the operations of a department, division or line of business. Managed Web Servers Hosted, or customer managed systems where IT@JH provides capacity and infrastructure and systems administration is provided by a department or division. Data Storage and data protection (backup/restore), either connected to host systems or directly accessible across the network. Support for custom systems requiring special networking, systems support, or other features not specifically identified in this document. Service Offering Matrix This document describes infrastructure fees billed on a monthly basis for a defined unit of measure. Monthly fees are charged to SAP cost centers and transferred to a Service Center budget. Usage reports are available as needed or on a monthly basis. Managed Services Rate Typical Uses Managed Virtual Server Management fee (in addition to resource fees) Managed Virtual Web Server (resource fees add l) Managed Citrix Virtual Server (in additional to resource fees) Resource Fees & Other Services Virtual Server Resource Hosting fees For customers who wish to utilize $200 per server per month IT@JH systems engineers for server management & security $300 per server per month Includes a managed web services package (see below for details) $200 per server per month (plus Citrix license fees) Charged in addition to Managed Service Fees $45.00 per VM per month base cost, plus $4.50 per virtual CPU (vcpu) per month $1.50 per GB of RAM (vram) per month $0.16 per GB Disk Storage per month For customers who need a Citrix server to publish applications to end users using any device Includes multi site data protection & Windows Server OS fees Enterprise Class Storage $0.16 per GB per month (XIV/3PAR) For virtual infrastructure, enterprise and critical applications Page 2

3 NAS Storage $0.04 per GB per month Network attached storage, includes replication and 6 weeks of snapshots. Two platforms are available based on usage requirements Managed File Services $0.25 per user per month (6GB user directory limits) End user home directories, no technical background required Hourly Services $110 per hour For any services outside the scope of included services Enterprise Unix Servers Vendor Priced Backend, large scale or clustered systems Physical Servers Vendor priced Used in cases where virtual servers do not meet resource requirements. Customer is responsible for all associated equipment costs Virtual Desktop $12 per user per month Provides a standard, secure, Windows 7 desktop, available from a wide range of devices How to Obtain Systems Management Services New customers who wish to initiate services with IT@JH should submit a request via to: etsmanagedservices@lists.johnshopkins.edu This inbox is monitored during business hours and you will receive a response within 1 business day. This inbox is not for problems requiring quick response. For problems, contact the IT@JH help desk at HELP. The appropriate oncall engineer will be contacted. Johns Hopkins IT Policies, Standards and Guidelines IT@JH adheres to all audit, compliance and regulatory policies relevant to the management of IT systems. The following link provides additional information related to these topics: Customers who manage their own virtual servers are required to adhere to the same set of policies and standards. Service Variations & Exceptions For each project or set of resources provided to a customer, a Service Level Addendum is used to document any variations, exceptions, exclusions and additions to the services outlined in this document. The SLA addendum will show itemized fees for various services. It is reviewed periodically with the customer and includes information on financial matters relating to any variations. Service Offerings and Key Service Level Responsibilities Managed Services are the most effective way to utilize IT@JH infrastructure services. The following section summarizes these services Depending on the level of service required, one or more groups will be responsible for delivering resources and services to a customer. Detailed service descriptions are provided in the appendices of this document. Managed Services IT@JH engineers work with the customer, vendor, and application administration team to optimally and securely configure enterprise & departmental class UNIX/Linux & Windows servers. IT@JH Managed Services include: Collaboratively define and configure a robust server environment that will utilize physical and/or virtual UNIX/Linux & Windows systems. Configure and install customized UNIX/Linux & Windows servers to meet the customer s specifications. Troubleshoot and resolve system related problems. Monitor system performance and tune the operating system to best support the application. Monitor hardware/software vendors for any required operating system patches or upgrades. Monitor hardware/software vendors for any required hardware or firmware upgrades. Monitor security advisories for operating system and infrastructure software, and take appropriate actions to safeguard resources. Page 3

4 Install security patches, upgrade software packages, and update system configuration to meet best practices. Maintain operating system and supported software documentation. Backup management Define, configure, and install a disaster recovery environment if the application is added to the critical applications list Managed services are required for systems that meet both the following criteria: If the system requires external access from outside the Johns Hopkins network, and; If the system will contain any Restricted Data Cloud Server and Storage Infrastructure In most cases, managed services are hosted within a common infrastructure, consisting of virtual hosts, data storage, networking and data protection services. Where appropriate, these services are also available for customer managed, or hosted systems, as described in the Cloud Services appendix. Agreement Acceptance of this agreement indicates that the customer agrees to all IT@JH Policies and Standards, and all components of this document, including appendices found in linked documents and the Service Level Agreement Addendum that outlines specific customer costs and terms. Cost center information will be supplied on the SLA Addendum. Customer Name: Date: Customer Signature: IT@JH Representative: Date: IT@JH Signature: Page 4

5 Infrastructure Services Detail Web Servers Virtual Virtual Hosting Fully Managed Fully Managed Customer Managed Environmental multiple power feeds included included included available in MTW only cooling included included included fire protection included included included Network 1gbps standard connectivity included included included 10gbps network connectivity optional Optional Optional Available in hosted virtual environment dual network connections included included included single or multiple site load balancing included optional optional requires multiple servers Hardware funding for server hardware, racks included included included redundant power supplies included included included hardware support contracts included included included 7x24x365 coverage req d System Configuration Access to virtual management console included Provided by sys admin Included Windows, Unix, Linux install and config included Included customer provided multi factor sys admin authentication included Included Included Required by IT@JH policy patch and update management included included customer provided Required to use IT@JH standards basic application and web services config included included customer provided standard operating system build included included customer provided Provided as a template Active Directory / DNS management included included customer provided Required to use IT@JH standards Admin/Services account management included included customer provided database services install/config included optional customer provided may require additional fee custom operating system build optional optional customer provided may require additional fee SSL traffic encryption included optional customer provided may require additional fee Windows Operating system license cost included Included Included JH funded Microsoft contract OS and system software support contract included Included Customer provided may require additional fee Monitoring/Alerting CMDB enrollment included included customer task required for all systems inventory / monitoring agent included included customer task required for all systems standard alerting included included customer task required for all systems anti virus, periodic security scans included included customer task required for all systems pager / alerts to specified contacts included included customer task requires configuration custom or application layer alerts included optional customer task requires configuration Mid range security/monitoring NA UpTime, QRADAR NA Additional Fee SAN Storage Features / Costs SAN connectivity included included included dedicated fiber channel network backup and restore services included included included 6 weeks data protection, 2 locations Enterprise grade virtual storage included Included Included Flash, SSD, RAID 10 disk solutions optional Optional optional Additional planning, funding required multi site data replication optional optional optional requires additional storage data snapshots optional optional optional requires additional storage Disaster recovery / disaster tolerance Off site data protection included Included Included multiple zone architecture optional Available Available configured using multiple servers support for multi site recovery & failover optional optional optional requires additional servers dedicated hardware for failover optional optional optional requires additional servers Personnel and Support named systems administrator included included customer provided Must adhere to all IT@JH policies Page 5

6 included included for virtual Customer is responsible for Windows/Linux 24x7x365 oncall support included infrastructure OS, security and management included adheres to all institutional standards audit compliance included customer provided and best practices included uses a formal change management change management process included customer provided process; customers are required to utilize the same process included Vendors are not provided admin access on an vendor coordination included customer provided ongoing basis documentation included included customer provided Use of CMDB required Page 6

7 Detailed Service Level Terms Help Desk / On call Teams The help desk is the primary contact for all customer issues regarding system problems and availability. The help desk maintains a directory of technical contacts to route issues to the appropriate person, 24 hours per day, 7 days per week, 365 days per year. Documentation Requirements IT@JH uses 3 systems to register and document servers and projects. These include: CMDB Configuration Management Database All systems must be registered in the CMDB. This tool is the primary record for tracking system configuration data. The CMDB consists of automatically collected data from system resident agents and manual data submitted by the project team or systems administrator. Change Management This tool tracks all changes made to a system over time, and contains an approval workflow. System changes requiring use of the change management systems are outlined later in this document. Incident Management This tool tracks all problems reported about the system and is managed by the Help Desk. Response & Recovery Times IT@JH uses a variety of tools and processes to prevent outages, monitor availability and performance and to restore data and functionality in case of problems. IT@JH teams provide 24x7x365 support coverage for production systems. If an problem occurs, call the help desk to get rapid access to the right team for your issue. The Johns Hopkins help desk will route calls to the appropriate team. Systems administrators will alert the help desk, application team and other technical teams as appropriate when a problem is discovered. Hours of daytime coverage by the primary system administrator or their backup are 8am 5pm After hours & weekend/holiday support is provided by on call support teams. Initial response to priority 1 and 2 problems is 30 minutes On site response during on call period, if required, is 2 hours Initial response to priority 3, or non critical problems is next half business day In case of delayed response, the Help Desk will escalate a problem to management Problem resolution efforts will continue around the clock until completed. Following is the typical approach to system recovery and restoration: Technical support staff first communicate with the help desk to, determining impact of a problem. Technical staff will then attempt to restore services and involve other technical staff as needed. In the event that a system requires a restore from backup, this determination is made within 8 hours. Restoration from backup is necessary if the system is not recoverable. Restore from backup will result in the loss of any data generated since the last backup. Once restored from backup, system access is returned to the customer or application team for verification, then to end users after confirmation is received. Backup & Restore Services Unless specifically directed, IT@JH maintains backups for each server it manages or hosts. Each server administrator is responsible for ensuring that backups are occurring. Reports are available to verify backup completion. When a system is restored from a backup copy, it will revert to the data and configuration present at the time of the backup. This may be the previous day or two days prior to outage, depending on the availability of a recent, successful backup. Backups occur each day, typically at night. Server performance may be lower during these times. Specialized backups are requested by working with an assigned systems administrator. Using multiple solutions to backup a Page 7

8 server can lead to performance and availability problems. This is a common issue with using database and server backups simultaneously. IT@JH retains 6 weeks of backup data, using disk based backups at two locations. Backup copies are used to restore a system to a recent copy, and are not intended as an archive solution. In the event of a server or database failure, the system is restored to the most recent successful backup. Restoring a server from a backup will result in the loss of any data added or changed since the last successful backup. Other data management tools, such as snapshots, replication or database transaction logging, are required to reduce the risk of data loss. The backup administrator is responsible for the overall availability of the backup system. Server administrators are responsible for Ensuring that backups are successful for each server, including the amount and type of data for each. Testing periodic restores, to ensure a server can be successfully returned to service after a failure. Delegation of Technical Administrative Rights To delegate control of customer managed systems, administrator access is provided to one or more of the following: Windows or Linux servers Active Directory Organizational Units, DNS subdomains vcenter folders and/or Resource Groups (for the purpose of adjusting server settings) vcenter datastores or storage pools (for the purpose of adjusting storage presented to individual servers) Customers are required to adhere to all Johns Hopkins IT policies and all IT@JH Standards and Guidelines, found at Remote access to a server by vendors or non IT@JH systems administrators is provided under a strict set of guidelines and communications protocols. Contact your systems administrator for the appropriate access process. Administrator or Root Access, Remote Access IT@JH adheres to all institutional policies regarding the confidentiality of data, including ephi (Protected Health Information) and all other protected information. Only authorized technical personnel and identified user communities receive access to servers. Application teams and customer representatives will not receive ongoing access to root, or administrative level rights. Domain & Directory Services IT@JH uses directory based management structures, including Active Directory and Domain Name Services (DNS). These structures provide a naming structure and various levels of security and access for server resources. Active Directory uses a common pool of user ID s that are used with access control lists (ACL s) for various server services and file systems. The creation of additional user accounts is restricted. Customers who manage servers are must obtain an Active Directory Organizational Unit to organize and manage their Windows systems, groups, service accounts and other required resources. Security Scans, Systems Management All servers managed or hosted in the IT@JH data centers are subject to scans for security vulnerabilities. Each systems administrator is responsible for updating servers with current patches, secure passwords, and best available security practices. Standards and guidelines for security practices and operating systems management are on the IT Policies web site ( A Configuration Manager Inventory agent is required for all Windows systems. Systems Center Endpoint Protection is required to reduce risk of malware infection. These and other monitoring and logging tools are available from the Enterprise Monitoring & Management Services Team. Systems Administrators will work with customers to determine the most appropriate method and schedule of patching. Standard Windows system patching options include Automated Patching of servers during test cycle recommended only for test servers. Fully automatic patching with automated reboot after test cycle used by most servers Page 8

9 Automated installation of patches with manual reboot used for clustered systems and other systems requiring additional attention. Scan only manual installation of patches. Used in rare cases where a system has specific software build dependencies. Use of this method must be approved by the technical area Director and the Project Sponsor at a Director level. The systems management team offers a variety of patch schedules designed to provide flexibility and minimize disruption IT@JH attempts to stay within the upgrade path provided by software vendors requiring testing and implementation of software upgrades for which the customer may receive no individual benefit. This practice provides an additional level of security for other systems in the data center environment. Alerting & Monitoring IT@JH uses monitoring and alerting systems to provide real time and historical information about the status of each server and the critical services it provides. IT@JH monitors the infrastructure technologies and the network for availability, performance, and security issues. Customers managing operating systems are responsible for monitoring those technologies, including security, operating system and any applications. Customers who manage systems are responsible for conducting network security vulnerability scans to obtain security reports. The EMMS Monitoring Guide, which covers CMDB, SCCM for Servers, Security Updates and Monitoring can be found at the following location: Risk Management & Disaster Planning Disaster recovery (DR) planning addresses the risk of data loss or outages exceeding 72 hours. Methods used to mitigate effects of longer outage require additional planning and engagement with the customer, application team and vendor. DR planning often requires additional costs. The IT@JH DR team is available for formal Disaster Recovery planning. Customers are responsible for preparing business continuity plans to mitigate risks related to system outages affecting normal business or clinical operations, or the loss of data. These downtime plans must also address the possibility of losing up to 48 hours of the most recent data, caused by reverting to a recent backup. Systems that require a higher degree of fault tolerance or data preservation are evaluated on a case by case basis. Risk of outage and data loss is present for all systems. Mitigation of risk is the responsibility of all parties. The architecture of an application or system will determine the level of risk. Use of technologies such as clustering, failover, multiple site recovery, data replication and redundancy are prevalent in modern IT systems. The infrastructure solutions provided by IT@JH allow for the creation of highly fault tolerant systems when designed properly. Change Management Practices Servers managed by IT@JH are categorized as being in one of 2 operating modes non production or production. Non production servers may be unavailable for at any time, with no guarantee of data integrity. A change management system tracks activities all types of activities on production systems. Use of the change management systems is required for customer and IT@JH managed systems. The types of activities subject to a change control include, but are not limited to: Turning the server off and on, or restarting the main server service. Starting and stopping any resident service. Installing any server based software. Changing access rights to any file system or application Modifying web, application and database server parameters Modifications to application software or databases Changing network device configurations between the server and the end users Any changes that may affect performance, security or stability of the system Any changes that may affecting an end user s experience with the system, particularly software changes that alter the functionality of an application residing on the server. Page 9

10 A change control record includes a description, potential impact, the type of change, contingency for failure, and backout procedures. In addition, changes include notification to the potentially affected users and require customer approval. The change management system uses a managerial and director approval process. Information about changes is available through the Service Manager system. Each Wednesday morning at 9am, changes are reported to the IT community via conference call and the change initiator or a designee must be present. Normal changes are discussed at the weekly change control meeting and require five business days of notice. These require manager and customer approval. Emergency changes occur when the system has partially failed and needs service, or when some type of critical failure is imminent. Emergency changes require approval by a director. Data Center Environment Servers managed by IT@JH are typically deployed in one of 2 data centers. The primary data center provides hosting for production systems and is configured with 2 zones for production failover and load balancing. Several miles away, a secondary data center provides recovery and testing functions. These centers provide a secure environment with restricted access to authorized personnel. The data centers are equipped with appropriate levels of air handling, power conditioning and centralized uninterruptable power supply (UPS). Servers are installed in racks, connected to the network by switched Ethernet network cards connected to switches, with a default 1 gigabit connectivity. Physical servers must be connected to at least two network connections and two different power feeds (Mt. Washington only). Critical equipment in the 1830 data center connects to two separate power feeds. Connectivity to storage area networks is provided by multiple fiber optic cables. The facilities are equipped with air handling, fire suppression and conditioned AC power. While rare, a data center may be subject to a power outage or other environmental problem. Scheduled maintenance outages to test power or for network and environmental changes occur on a regular basis. Some of these outages will require planned system downtime, to be communicated and scheduled in advance with customers and technical contacts. Licenses IT@JH maintains many site licenses for software used on servers to help reduce costs for customers. Microsoft products, including most client access licenses (CALs) and server licenses are included in the cost of shared services. For database software and application software, customers are typically responsible for these costs, as well as the cost of ongoing support and maintenance. Legacy & Unsupported Systems A legacy system is considered any set of software, hardware and technology that consists of one or more components (server, hardware, software, technology, etc) no longer considered current or supportable. A 3 rd party vendor or IT@JH support group may designate a system as legacy or out of support. Support for legacy systems is limited in terms of response time and problem resolution time. Specific support limitations for legacy systems are identified in an SLA Addendum. Page 10

11 Appendix: Enterprise Systems Management Capabilities Enterprise Systems Management hosts and manages enterprise and departmental servers on behalf of our customer base, spanning many applications and/or projects. These servers provide a wide range of services, including groupware, clinical, research, financial/administrative applications, gateway and application based web. A highly trained team of educated and experienced personnel are on staff and available for your support, consultation, proactive systems management as well as routine trouble ticket and/or problem response. Items below are additions and/or modifications to the Information Johns Hopkins Enterprise Technologies Services Server & Storage Management Service Offerings Service Offering Enterprise Systems Management offers the following services: Server Management for departmental or enterprise level systems Project support that require windows based servers Technical liaison between other technical groups, vendors and IT teams Enterprise Systems Management offers a single support option for server management, with this option being complete and total management of the server. This service begins with the acquisition of the hardware (if necessary) through server and operating system build, production implementation and maintenance through the project/server lifecycle. The fee schedule is flexible depending on the nature of the server(s) or project that needs management. (fee schedule will reflect base service agreement pricing) There still may be the need for additional costs, like hardware or software purchases, licensing and other similarly related expenses common with server management though. All clients are encouraged to discuss their individual requirements with ESM prior to budgeting, allowing customizable solutions specifically architected to your needs. In Depth Overview of Offered Services This offering is a comprehensive server management solution for internal clients of the Johns Hopkins Institutions. Enterprise Systems Management assumes all server management responsibilities including the following: Hardware standards & specifications Implementation planning and system architecture Installation of server hardware into the appropriate physical environment Installation of operating system and current service packs Configuration of operating system according to industry and institutional best practices for the application being supported Adherence to institutional standards for installation and support of operating system Inclusion into the proper management entity (domain, AD forest) Server accounts creation, deletion and modification Automated updates with recommended patches, manual updates where required Notification of license purchase requirements and Johns Hopkins agreements for reduced rates Backup and restore of server data, including databases, configuration data and file systems 24x7x365 monitoring of appropriate server services, with interruption notification to support staff 24x7x365 human response to critical server outages resulting in a priority 1 problem, as defined by the JHMCIS Support Center. 2 hour on site response time for server outages Adherence to IT@Hopkins change control policies Disk space utilization planning, data use policies High level of coordination with vendor and application teams High degree of outage planning Disaster Recovery and Tolerance planning, coordination and testing. Emergency response using previously staged failover hardware and procedures Proactive capacity and performance planning System Administrator involvement in application loads and upgrades Coordination of security, firewall and intrusion detection with network security Installation and Configuration of Server Hardware and OS Page 11

12 Enterprise Systems Management uses a standard set of installation practices for each operating system it supports. These adhere to common industry best practices and are designed for supportability and high levels of security. Data and systems partitions are kept separate from one another and systems monitoring parameters are increased from the default levels. The service pack level is generally current with the manufacturer s latest release, with a day lag time for internal testing and acceptance. Account Management Enterprise Systems Management provides all user account management for servers and users of server services. Maintenance of the central pool of user ID s and the information provided in this pool is the responsibility of Engineering Services Security. Users are provided access to resources by completing a security form obtainable from JHMCIS Security and having it approved by departmental management. Clients are encouraged to ensure that the change in status of persons with access to servers is communicated to JHMCIS security as soon as is practicable. Enterprise Systems Management will remove or change access privileges to these systems based on changes in status. All persons needing access to servers managed by Enterprise Systems Management will be required to submit confidentiality & systems access form, which indicates acceptance of all JHH and JHU policies regarding the use of Johns Hopkins owned computer resources. Patches and Upgrades Frequently vendors of operating systems and applications release upgrades, service packs or general software patches for all systems. It is the preference of Enterprise Systems Management to install all patches and service packs as quickly as possible, after a short period of testing. Although Enterprise Systems Management will install application patches, it is up to the application team to make the installation request and provide the patch installation software and any corresponding documentation. Enterprise Systems Management employs a technology that automatically distributes approved operating system patches to all servers post testing on a bi weekly basis. While Enterprise Systems Management will coordinate upgrades with the appropriate parties, including application specialists, vendors and clients, it is the responsibility of the application vendor to alert Enterprise Systems Management when specific patches and service packs are not compatible with server based software. In cases where a specific update is needed to address issues with a specific client s server, Enterprise Systems Management will install this product after discussions with the client, and the appropriate vendor representatives. Enterprise Systems Management attempts to stay within the upgrade path provided by software vendors and may require testing and implementation of software upgrades for which the client may receive no specific or individual benefit. This is done to ensure that the operating system revisions is supported by the vendor or to ensure that all servers are at the same revision level to keep management costs in check. License Management The client is responsible for the purchase and management of all application related licensing and in certain cases non customary licensing needed for complex or nonstandard architectures. Clients will generally pay for costs on a yearly basis and this should be factored in to the cost of each project. 3 rd Party Software Application groups that choose to use third party software which does not have a direct relationship towards the function of the Enterprise application itself will be the responsibility of the application team or vendor. ESM will offer support services for the intel SERVER hardware and operating system but will not be responsible for support, usage, training, licensing and associated costs with such third party software. Legacy Systems Support Enterprise Systems Management is not in a position to provide priority one support for legacy servers, hardware, software or any support for environments that run legacy application software, regardless of hardware status. ESM will make no guarantees on its ability to fix, repair, recover or limit downtime on a system deemed legacy. Page 12

13 Appendix: Enterprise Web Services (Hosted) Systems Enterprise Web Services hosts and manages web hosting servers on behalf of our customer base, spanning multiple web sites, applications and/or projects. A highly trained web system engineer team of industry certified, educated and experienced personnel are on staff and available for your support, consultation, and proactive systems management. Web Service engineers work with you, your vendor, and developers to optimally and securely configure web based application for internal and/or external access. Apache Tomcat, IIS, ColdFusion,.NET Provide MySQL and MSSQL backend Provide Reverse Caching Proxies for Security, Load Balancing, and Compression Manage SSL Certificates Free Domain Name Registration SSO/JHED Integration Troubleshoot and resolve system related problems Monitor vendor resources for any required operating system patches or upgrades Monitor vendor resources for any required hardware upgrades Monitor for file system intrusion (intrusion detection) Respond to monitoring alerts and client reported problems. During non business hours, support will be provided when either the hardware, operating system, or infrastructure software is unavailable or the ability to use these resources is severely degraded. Monitor security advisories for operating system and infrastructure software, and take appropriate actions to safeguard resources Implement security patches as needed System account management Document and submit change management requests for proper approval as required. Change Management is required for any change that may impact end users. Security patches, upgrade software packages, and update system configuration to meet IT@JH best practices Firmware upgrades as required Maintain operating system and supported software documentation System level housekeeping activities to ensure systems are operating at optimal levels Backup management Requesting firewall configuration Appendix: Customer Managed (Hosted) Systems Where appropriate, IT@JH provides a hosted service for infrastructure services. In these cases, the core systems management and operating system management responsibilities are provided by the customer organization, through customer supplied Windows and Linux Systems administrators and engineers. This document outlines the methods and practices used by IT@JH systems management personnel. For customermanaged systems, the Systems Administrator/Engineer provided by the customer is responsible for adhering to all of these methods and practices, as well as all relevant Johns Hopkins audit, compliance and regulatory policies. Customer using hosted services work with the Cloud Services team as a primary point of contact to other IT@JH teams. To request these services, cloudrequests@johnshopkins.edu. Additional teams are responsible for incident management, change management, documentation standards, networking support, storage and virtualization hosting services and monitoring/alerting systems. On customer managed servers, the customer is responsible for operating system installation and configuration. Templates, or standard operating system builds are available for Windows. The customer maintains full responsibility for configuration, security an ongoing server management, including the procurement of 3 rd party support for operating systems, databases and other server based components and applications. Page 13

14 Server Virtualization Team This team is responsible for the server virtualization infrastructure including the following items: Virtual Host and cluster capacity planning and infrastructure architectural design Server virtualization configuration and resource pool creation and allocation Engineering and technical support of the virtual hypervisor OS Hardware standards, configuration and engineering technical support Automation of various engineering processes involving virtualization Host monitoring and alerting using vsphere Operations Manager Management of virtual environment network VLANs and security policies in coordination with Networking Virtual machine migration processes Coordination of all issues that require virtualization (i.e. VMware) support; internal and external Planning and maintenance of virtual infrastructure upgrades, including hypervisor upgrades and host firmware upgrades Management of virtualization administration consoles, security roles and management servers. All virtual infrastructure storage requests and configuration Communication and implementation of best practices in VM configuration and management in a virtual environment (VM Tools versions, Network configuration, Storage Configuration) Approval of all third party software for virtualization integration 24x7x365 oncall engineering support for hardware and virtual environment Research, development and implementation of new virtualization technologies and hardware solutions Storage / Data Protection Team This team is responsible for the following: Storage Network and Storage Array configuration and management Storage pool allocation Storage pool capacity management and monitoring Storage quota management Backup System management and configuration Overall management of the enterprise backup system including media servers, storage arrays, access control, and schedules Distribution of daily backup reports Education and information related to backup options and configuration Communication related to upgrades, incidents, best practices, and standards Provide console access so that users are able to self service Setup proper alerting and monitoring of the system Ensure that backup jobs are running and address any issues that are seen on a daily basis. Appendix: Storage Offering Details All current storage offerings are housed in managed data centers with redundant power and service contracts that provide 4 hour response time for disk and controller failures. The key differences in storage offerings are noted below. Enterprise Class Storage Enterprise class storage is our highest performing SAN storage option. This is typically used for databases, virtual servers, critical applications and other uses where performance is an important factor. The storage systems are typically using smaller high speed drives, fast internal connectivity and utilize disk cache and SSD to improve performance. Software on the arrays allow for different options for storage protection and redundancy such as snapshots, mirroring and replications. Examples of current hardware used for this option are IBM DS8800, XIV, 3PAR. NAS Storage Page 14

15 NAS storage is a storage option presented over the network. NAS storage is an enterprise class replacement for individual file servers. The NAS environment is built with capacity and growth in mind. NAS is used for departmental shared drives and bulk storage where performance requirements are low. Access is controlled by Active Directory security groups and subfolders can be restricted to only allow access to authorized users. Quota allocations can be purchased in 100GB increments. We maintain several snapshot policies to help protect your data. You may elect to protect your data for 6 weeks, 2 weeks, or 2 days. All snapshot space will count against quota. Snapshots can be viewed using windows previous version functionality. We currently have an EMC VNX and an EMC Isilon solution in place to support this environment. Home Directory Services Provides network file storage to IT support groups and individuals within the Johns Hopkins institutions. This provides a centrally stored, safe and reliable location for user files and frees the support staff from the time and cost of maintaining separate storage and backup systems. No technical background is required. 6GB of storage space is provided for each user Home Directory. Home Directories are secure and are only accessed by the user to which they are assigned. These directories are configured to automatically map at logon using the Home Directory path in the user s Active Directory profile. Discontinued Services Commodity Secondary Storage originally provided as a 2 nd or 3 rd copy without backup, this solution is no longer offered Backup Services (a la carte) some customers use the enterprise backup system from a customer managed data center. These services are integrated into virtual server and data center offerings, but no longer offered separately. Existing backup only customers will be able to continue to use these services, or may migrate to a virtual hosting environment Page 15

16 Appendix: Virtual Desktop Offering Cloud & Virtualization Services has a standard offering of Windows7 virtual desktops. Hopkins standard application software is pre loaded. This includes Microsoft Office 2013, Adobe Reader, IE10, Google Chrome and other utility software. It utilizes the standard Enterprise Client Image to ensure all included software is agreed upon by enterprise IT groups. Current specifications: 1 CPU 2 Gb RAM 40Gb Hard drive Appendix: Citrix XenApp Application Virtualization Cloud & Virtualization Services administers a large, disaster tolerant Citrix Farm. Applications can be made available to groups that are geographically diverse or groups that utilize different types of client operating systems. The application can be delivered to any operating system (including tablets and smartphones) via the Citrix Receiver. Most applications can be made available via Citrix. Occasionally, some modifications are required to emulate a standard endpoint installation. Requirements: Initially a request to Cloudrequests@jhmi.edu is required to instantiate the process. Software necessary to install the application Installation instructions Custom requirements (i.e. policy driven controls, ancillary hardware to be used with application, etc.) Security access process Appendix: Useful IT@JH contacts In most cases, the request process addresses indicated above are the most effective way to obtain services. However, for more specific situations, the following addresses are provided as a useful reference: Cloud & Virtualization Services Web Hosting Mid Range (Unix/Linux) CMDB, Security Updates, Monitoring Data Center Network Domain Name Services (DNS) Active Directory Network security/firewalls: Data Center Engineering ESSO, SafeNet, Web Single Sign on: VPN (Virtual Private Networking) SSL Certs Disaster Recovery Team cloudrequests@johnshopkins.edu webhosting@jhu.edu midrangets@jhmi.edu monitoring@jhmi.edu DCN@jhu.edu Hostmaster@jhmi.edu ad@jhmi.edu Network.Security@jhmi.edu DCE@jhmi.edu enterpriseauth@jhmi.edu vpnadmins@jhmi.edu pkiadminis@jhmi.edu IT_JH_DR@jhmi.edu Page 16

17 Appendix: Midrange Team Midrange Team SLA Addendum to the ETS Service Offerings Unified SLA Updated: February 25, 2015 This document is intended to provide internal Johns Hopkins clients with information regarding the service and support capabilities of the Midrange System Team, as it relates to the management of servers in the Johns Hopkins networking environment. Items below are additions and/or modifications to the Information Johns Hopkins Enterprise Technologies Services Server & Storage Management Service Offerings. Sections below are paired between the Midrange Addendum and the Unified SLA. Installation & Configuration of Server Operating System The Midrange team should be involved in the system design of new application environments that will utilize UNIX/Linux systems to insure that the servers integrate successfully into our existing environment and are capable of providing the level of support needed by the application. Installation of the operating system, server network configuration, and all system level tasks will be performed by the Midrange Team. Most operating system builds are custom builds by the Midrange team to meet specific needs of customer s applications. The Application admin team will provide all operating system and operating system related ancillary software requirements for their application. A test environment must be in place to support the application. This environment will allow for testing of operating system, configuration, and/or application updates without impacting the production environment. The Midrange Team does not provide installation, troubleshooting, or support for databases. Operating System Patching & Maintenance The Midrange team has adopted a conservative strategy for operating system patch management typical of large scale UNIX implementations. This insures the integrity of the system, high application availability, compatibility with application components and/or databases, proper patch testing, and compatibility with hardware microcode. Operating system patches and/or hardware microcode updates will be done on an as needed basis. This includes, but is not limited to: o An upgrade or patch to an application may require operating system or component patching. o The operating system vendor may drop support on an old version of the operating system resulting in an O/S upgrade. o The application vendor may have patches to resolve problems that include operating system related fixes. As security vulnerabilities become known security patches will be implemented accordingly. An agreed upon system maintenance window should be established. Change Management Practices Customer calls for application failures/outages/errors should go to the Help Desk and an appropriate incident should be opened and assigned to the Application Admin team. Initial triage of application problems will be completed by the application admin team. If they or the vendor determine that the problem is related to the operating system the ticket should be reassigned to Midrange and a Midrange Team member will work with them to continue diagnostics and resolution of the problem. Vendor problem tickets associated with an application will be opened with the application vendor by the Application Admin team. Operating system related vendor problem tickets will be opened and managed by the Midrange Team. Administrator or Root Access, Remote Access Page 17 In order to insure the integrity of the system, root access will be limited to the Midrange Team. During application installation, customization, and configuration (the application build process) the root password may be made available to the application admin team for an agreed upon time period.

18 In an emergency, when root access is needed quickly, the Midrange on call person is to be called to grant this access. All access to servers will be done via encrypted program (ssh). Managed Hardware A 7X24 hardware support contract must be in place providing hardware support for production servers. A lower level of coverage is acceptable for non production servers if the application owner is willing to accept the down time and risk. An operating system support contract must be completed providing 7X24 support for all production servers. Alerting & Monitoring UpTime is the standard monitoring package for all servers the Midrange team supports. Customers will need to purchase a license of UpTime for their servers and pay the annual maintenance fee. Application related alerts can be configured in the UpTime application and should be sent to the Application Team on call pager. Operating system based alerts will be sent to the Midrange team and the on call pager. Production UNIX servers will have a Tenable (security) scan run monthly. These scans will analyze the server to help prevent potential security holes. The systems engineer will work with the Application Admin team to resolve any outstanding security exposures. IBM s Security QRadar SIEM is used to collect and consolidate log source event data from production UNIX servers to distinguish real threats from false positives. IBM s AIX OS AIXPert and Linux s SELinux can be utilized to harden and secure system related access control policies. Page 18

MSP Service Matrix. Servers

MSP Service Matrix. Servers Servers MSP Service Matrix Microsoft Windows O/S Patching - Patches automatically updated on a regular basis to the customer's servers and desktops. MS Baseline Analyzer and MS WSUS Server used Server

More information

Customized Cloud Solution

Customized Cloud Solution Customized Cloud Solution (Overall Cloud Performance Expectations) Last Updated: June 5, 2012 Prepared by: Polleo Systems, Inc. Notice of Confidentiality: The enclosed material is proprietary to Polleo

More information

Unlimited Server 24/7/365 Support

Unlimited Server 24/7/365 Support Unlimited Server 24/7/365 Support Unlimited Server Support from System Architects covers your Windows servers, Linux servers and virtual machines. Your servers are monitored and managed 24 hours a day,

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

David.Balka@chi.frb.org 2009 STREAM FRBC

David.Balka@chi.frb.org 2009 STREAM FRBC Virtualization ti Dave Balka David.Balka@chi.frb.org Examination Elements Architecture Management Processes Integrity Availability Security 2 Datacenter Consolidation 3 What is Virtualization A framework

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE

California Department of Technology, Office of Technology Services WINDOWS SERVER GUIDELINE Table of Contents 1.0 GENERAL... 2 1.1 SUMMARY...2 1.2 REFERENCES...2 1.3 SUBMITTALS...2 1.3.1 General...2 1.3.2 Service Request...3 1.4 EXPECTATIONS...3 1.4.1 OTech...3 1.4.2 Customer...3 1.5 SCHEDULING...4

More information

Vistara Lifecycle Management

Vistara Lifecycle Management Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

Support Guide Comprehensive Hosting at Nuvolat Datacenter

Support Guide Comprehensive Hosting at Nuvolat Datacenter Support Guide Comprehensive Hosting at Nuvolat Datacenter 1 Table of Contents Introduction... 4 Roles, Responsibilities & Expectations... 4 Customer... 4 Nuvolat Support... 5 Deliverables... 5 Best Practices...

More information

MiServer and MiDatabase. Service Level Expectations. Service Definition

MiServer and MiDatabase. Service Level Expectations. Service Definition MiServer and MiDatabase Service Description Service Definition As part of the NextGen Michigan initiative, Information and Technology Services has engaged in building a private cloud offering to support

More information

Guardian365. Managed IT Support Services Suite

Guardian365. Managed IT Support Services Suite Guardian365 Managed IT Support Services Suite What will you get from us? Award Winning Team Deloitte Best Managed Company in 2015. Ranked in the Top 3 globally for Best Managed Service Desk by the Service

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

ATTACHMENT J WINDOWS PLATFORM

ATTACHMENT J WINDOWS PLATFORM 1 DESCRIPTION OF SERVICE 1.1 WINDOWS CAPACITY UNIT Provides processing capacity when dedicated server resources are required to support the associated Windows Managed Server service. Capacity Units are

More information

1.1 SERVICE DESCRIPTION

1.1 SERVICE DESCRIPTION ADVANIA OPENCLOUD SERCVICE LEVEL AGREEMENT 1.1 SERVICE DESCRIPTION The service is designed in a way that will minimize Advania s operational involvement. Advania administrates the cloud platform and provides

More information

Office of Information Technology Hosted Services Service Level Agreement FY2009

Office of Information Technology Hosted Services Service Level Agreement FY2009 Application Name: Application Agreement Start Date: 07/01/08 Customer Name: Customer Agreement Renewal Date: 06/30/09 SLA Number: HSxxxFY09A Service Description: This document describes the technical support

More information

Hosted SharePoint: Questions every provider should answer

Hosted SharePoint: Questions every provider should answer Hosted SharePoint: Questions every provider should answer Deciding to host your SharePoint environment in the Cloud is a game-changer for your company. The potential savings surrounding your time and money

More information

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month

Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month SERVICE COVERAGE AND FEE SCHEDULE Base Package Fees Monthly Fee Per Server 75/month 295/month 395/month Monthly Fee Per Desktop/Notebook/ 15/month 45/month 55/month Live Desk Services Live Desk Telephone

More information

Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description

Bare Metal Cloud. 1.0 Terminology. 3.0 Service Options. 2.0 Service Description This Bare Metal Cloud Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services to Customer.

More information

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com

Contents UNIFIED COMPUTING DATA SHEET. Virtual Data Centre Support. www.interoute.com Contents Scope of this Document... 2 Product Overview... 2 Virtual Data Centre and VDC Dedicated Infrastructure... 2 Service Levels... 3 Severity and Support Response Times... 4 On-boarding... 5 Incident

More information

CLOUD SERVICE SCHEDULE

CLOUD SERVICE SCHEDULE CLOUD SERVICE SCHEDULE 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule, unless

More information

VMware vsphere 5.1 Advanced Administration

VMware vsphere 5.1 Advanced Administration Course ID VMW200 VMware vsphere 5.1 Advanced Administration Course Description This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter.

More information

VMware vsphere 5.0 Boot Camp

VMware vsphere 5.0 Boot Camp VMware vsphere 5.0 Boot Camp This powerful 5-day 10hr/day class is an intensive introduction to VMware vsphere 5.0 including VMware ESX 5.0 and vcenter. Assuming no prior virtualization experience, this

More information

Virtual Server and Storage Provisioning Service. Service Description

Virtual Server and Storage Provisioning Service. Service Description RAID Virtual Server and Storage Provisioning Service Service Description November 28, 2008 Computer Services Page 1 TABLE OF CONTENTS INTRODUCTION... 4 VIRTUAL SERVER AND STORAGE PROVISIONING SERVICE OVERVIEW...

More information

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment

Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment Lesson Plans Microsoft s Managing and Maintaining a Microsoft Windows Server 2003 Environment (Exam 70-290) Table of Contents Table of Contents... 1 Course Overview... 2 Section 0-1: Introduction... 4

More information

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER

VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER VMWARE VSPHERE 5.0 WITH ESXI AND VCENTER CORPORATE COLLEGE SEMINAR SERIES Date: April 15-19 Presented by: Lone Star Corporate College Format: Location: Classroom instruction 8 a.m.-5 p.m. (five-day session)

More information

Spyders Managed Security Services

Spyders Managed Security Services Spyders Managed Security Services To deliver world-class Managed Security Services, Spyders must maintain and invest in a strong Security Operations Centre (SOC) capability. Spyders SOC capability is built

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Request for Information (RFI) for Managed Hosting Service

Request for Information (RFI) for Managed Hosting Service FOOD AND AGRICULTURE ORGANIZATION OF THE UNITED NATIONS ORGANISATION DES NATIONS UNIES POUR L ALIMENTATION ET L AGRICULTURE ORGANIZACION DE LAS NACIONES UNIDAS PARA LA AGRICULTURA Y LA ALIMENTACION Viale

More information

Hosting Services - Dedicated Service Agreement Page 1 of 6

Hosting Services - Dedicated Service Agreement Page 1 of 6 Hosting Services - Dedicated Service Agreement Page 1 of 6 This Hosting Services - Dedicated Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,

More information

CounselorMax and ORS Managed Hosting RFP 15-NW-0016

CounselorMax and ORS Managed Hosting RFP 15-NW-0016 CounselorMax and ORS Managed Hosting RFP 15-NW-0016 Posting Date 4/22/2015 Proposal submission deadline 5/15/2015, 5:00 PM ET Purpose of the RFP NeighborWorks America has a requirement for managed hosting

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

Data Center Colocation - SLA

Data Center Colocation - SLA 1 General Overview This is a Service Level Agreement ( SLA ) between and Data Center Colocation to document: The technology services Data Center Colocation provides to the customer The targets for response

More information

ACME Enterprises IT Infrastructure Assessment

ACME Enterprises IT Infrastructure Assessment Prepared for ACME Enterprises March 25, 2014 Table of Contents Executive Summary...2 Introduction...2 Background...2 Scope of IT Assessment...2 Findings...2 Detailed Findings for Key Areas Reviewed...3

More information

CMB 207 1I Citrix XenApp and XenDesktop Fast Track

CMB 207 1I Citrix XenApp and XenDesktop Fast Track CMB 207 1I Citrix XenApp and XenDesktop Fast Track This fast paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications in the datacenter

More information

About Backing Up a Cisco Unity System

About Backing Up a Cisco Unity System CHAPTER 4 Introduction This chapter describes in general terms backing up a Cisco Unity system. When you back up a Cisco Unity server (and one or more Exchange servers) you need to consider the same issues

More information

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES

SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES SERVICE SCHEDULE INFRASTRUCTURE AND PLATFORM SERVICES This Product Schedule Terms & Conditions is incorporated into a Services Agreement also comprising the General Terms and Conditions which the Customer

More information

G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service

G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service G-Cloud 6 Service Definition DCG Cloud Disaster Recovery Service 1 of 19 CONTACT INFORMATION Guy Silver T: 07733 008799 E: guy.silver@dcggroup.com W: www.dcggroup.com Data Continuity Group Limited, Bridge

More information

CLOUD SERVICE SCHEDULE Newcastle

CLOUD SERVICE SCHEDULE Newcastle CLOUD SERVICE SCHEDULE Newcastle 1 DEFINITIONS Defined terms in the Standard Terms and Conditions have the same meaning in this Service Schedule unless expressed to the contrary. In this Service Schedule,

More information

Keyfort Cloud Services (KCS)

Keyfort Cloud Services (KCS) Keyfort Cloud Services (KCS) Data Location, Security & Privacy 1. Executive Summary The purposes of this document is to provide a common understanding of the data location, security, privacy, resiliency

More information

Exhibit to Data Center Services Service Component Provider Master Services Agreement

Exhibit to Data Center Services Service Component Provider Master Services Agreement Exhibit to Data Center Services Service Component Provider Master Services Agreement DIR Contract No. DIR-DCS-SCP-MSA-002 Between The State of Texas, acting by and through the Texas Department of Information

More information

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet:

Managed Hosting is a managed service provided by MN.IT. It is structured to help customers meet: Managed Hosting Service Description Version 1.10 Effective Date: 3/3/2015 Purpose This Service Description is applicable to Managed Hosting services (MH) offered by MN.IT Services (MN.IT) and described

More information

Server Operations Managed Servers Service Level Agreement (SLA)

Server Operations Managed Servers Service Level Agreement (SLA) Server Operations Managed Servers Service Level Agreement (SLA) Overview The goal of this SLA is to delineate responsibilities, communication paths, and other details surrounding server support provided

More information

Central Server Hosting Service Detail

Central Server Hosting Service Detail Central Server Hosting Service Detail Overview: CIO/OFT s Data Centers hosts more than 1,800 operating system instances on over 1300 physical servers in centralized centers and more than 350 servers in

More information

Tailored Technologies LLC

Tailored Technologies LLC 685 Third Avenue New York, NY 10017 Tel: (212) 503-6300 Fax: (212) 503-6312 Date: January 9, 2014 To: The Audit File of the Hugh L. Carey Battery Park City Authority From: Tailored Technology Observations

More information

Enterprise Manager. Version 6.2. Administrator s Guide

Enterprise Manager. Version 6.2. Administrator s Guide Enterprise Manager Version 6.2 Administrator s Guide Enterprise Manager 6.2 Administrator s Guide Document Number 680-017-017 Revision Date Description A August 2012 Initial release to support version

More information

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Table of Contents. CSC CloudCompute Service Description Summary CSC 1 Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

vsphere Upgrade vsphere 6.0 EN-001721-03

vsphere Upgrade vsphere 6.0 EN-001721-03 vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Hosting Services - Virtual Service Agreement Page 1 of 6

Hosting Services - Virtual Service Agreement Page 1 of 6 Hosting Services - Virtual Service Agreement Page 1 of 6 This Hosting Services - Virtual Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions,

More information

VMware vsphere-6.0 Administration Training

VMware vsphere-6.0 Administration Training VMware vsphere-6.0 Administration Training Course Course Duration : 20 Days Class Duration : 3 hours per day (Including LAB Practical) Classroom Fee = 20,000 INR Online / Fast-Track Fee = 25,000 INR Fast

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10

Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10 Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS

More information

Veritas Storage Foundation High Availability for Windows by Symantec

Veritas Storage Foundation High Availability for Windows by Symantec Veritas Storage Foundation High Availability for Windows by Symantec Simple-to-use solution for high availability and disaster recovery of businesscritical Windows applications Data Sheet: High Availability

More information

NET ACCESS VOICE PRIVATE CLOUD

NET ACCESS VOICE PRIVATE CLOUD Page 0 2015 SOLUTION BRIEF NET ACCESS VOICE PRIVATE CLOUD A Cloud and Connectivity Solution for Hosted Voice Applications NET ACCESS LLC 9 Wing Drive Cedar Knolls, NJ 07927 www.nac.net Page 1 Table of

More information

CLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS

CLOUD SERVICES (INFRASTRUCTURE) SERVICE TERMS PART C - INFRASTRUCTURE CONTENTS CONTENTS 1 ABOUT THIS PART... 2 2 GENERAL... 2 3 CLOUD INFRASTRUCTURE... 2 4 TAILORED INFRASTRUCTURE... 3 5 COMPUTE... 3 6 SECURITY... 9 TELSTRA GLOBAL. Cloud Services (Infrastructure) Part C updated as

More information

Citrix Desktop Virtualization Fast Track

Citrix Desktop Virtualization Fast Track Citrix Desktop Virtualization Fast Track Description: Days: 5 Prerequisites: This fast-paced course provides the foundation necessary for students to effectively centralize and manage desktops and applications

More information

CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING

CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING CHOOSE CONNECTRIA CLOUD AND MANAGED HOSTING There are hundreds of managed hosting providers that all claim to offer the best managed hosting. But there are vast differences in terms of their reliability,

More information

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security

Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Overview Blackboard Collaborate Web Conferencing Hosted Environment Technical Infrastructure and Security Blackboard Collaborate web conferencing is available in a hosted environment and this document

More information

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX

SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX White Paper SECURE, ENTERPRISE FILE SYNC AND SHARE WITH EMC SYNCPLICITY UTILIZING EMC ISILON, EMC ATMOS, AND EMC VNX Abstract This white paper explains the benefits to the extended enterprise of the on-

More information

HRG Assessment: Stratus everrun Enterprise

HRG Assessment: Stratus everrun Enterprise HRG Assessment: Stratus everrun Enterprise Today IT executive decision makers and their technology recommenders are faced with escalating demands for more effective technology based solutions while at

More information

Information Technology Solutions. Managed IT Services

Information Technology Solutions. Managed IT Services Managed IT Services System downtime, viruses, spyware, lost productivity; if these problems are impacting your business, it is time to make technology work for you. At ITS, we understand the importance

More information

IT Sr. Systems Administrator

IT Sr. Systems Administrator IT Sr. Systems Administrator Location: [North America] [United States] [Monrovia] Category: Information Technology Job Type: Open-ended, Full-time PURPOSE OF POSITION: Systems Administrators and Engineers

More information

Managed Service Plans

Managed Service Plans Managed Service Plans www.linkedtech.com 989.837.3060 989.832.2802 fax Managed Information Technology Services System downtime, viruses, spy ware, losses of productivity Are the computer systems you rely

More information

RES ONE Automation 2015 Task Overview

RES ONE Automation 2015 Task Overview RES ONE Automation 2015 Task Overview Task Overview RES ONE Automation 2015 Configuration Tasks The library Configuration contains Tasks that relate to the configuration of a computer, such as applying

More information

SAP hybris Commerce, cloud edition, Managed Services Description

SAP hybris Commerce, cloud edition, Managed Services Description SAP hybris Commerce, cloud edition, Managed Services Description Effective June 2015 OBJECTIVES AND SCOPE This document provides supplemental information regarding the Managed Services for the SAP hybris

More information

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI

JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI JOB ORIENTED VMWARE TRAINING INSTITUTE IN CHENNAI Job oriented VMWARE training is offered by Peridot Systems in Chennai. Training in our institute gives you strong foundation on cloud computing by incrementing

More information

Blackboard Managed Hosting SM Disaster Recovery Planning Document

Blackboard Managed Hosting SM Disaster Recovery Planning Document BLACKBOARD MANAGED HOSTING Blackboard Managed Hosting SM Disaster Recovery Planning Document Prepared By: MH Services Modified Date: March 2009 Revision: 1.8 1. OBJECTIVES... 3 2. SCOPE... 3 3. ASSUMPTIONS...

More information

Service Level Agreement SAN Storage

Service Level Agreement SAN Storage Service Level Agreement SAN Storage Executive Summary This Service Level Agreement defines the support provided by UCIT to the University of Cincinnati s Storage Area Network (SAN) users as well as the

More information

Server Operations Managed Servers Service Level Agreement (SLA)

Server Operations Managed Servers Service Level Agreement (SLA) Server Operations Managed Servers Service Level Agreement (SLA) Overview The goal of this SLA is to delineate responsibilities, communication paths, and other details surrounding server support provided

More information

Cloud-based Managed Services for SAP. Service Catalogue

Cloud-based Managed Services for SAP. Service Catalogue Cloud-based Managed Services for SAP Service Catalogue Version 1.8 Date: 28.07.2015 TABLE OF CONTENTS Introduction... 4 Managed Services out of the Cloud... 4 Cloud-based Flexibility, Efficiency and Scalability...

More information

DEDICATED MANAGED SERVER PROGRAM

DEDICATED MANAGED SERVER PROGRAM DEDICATED MANAGED SERVER PROGRAM At Dynamic, we understand the broad spectrum of issues that come with purchasing and managing your own hardware and connectivity. They can become costly and labor intensive

More information

IT Labor (Hourly Billable) Data Base Hosting

IT Labor (Hourly Billable) Data Base Hosting Cost Pool Definitions for Information Technology (IT) Services FY16/17 (Effective July 1, 2015) IT Labor (Hourly Billable) B/A 1365 - Programmer/Developer: EITS provides a variety of software development

More information

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization

Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Outline SSS6422 - Microsoft Windows Server 2008 Hyper-V Virtualization Duration: Three consecutive Saturdays About this Course This instructor led course teaches students how to implement and manage Windows

More information

Active Directory Infrastructure Design Document

Active Directory Infrastructure Design Document Active Directory Infrastructure Design Document Written By Sainath KEV Microsoft MVP Directory Services Microsoft Author TechNet Magazine, Microsoft Operations Framework Microsoft Speaker - Singapore Document

More information

Database SQL Server SERVER. Framework. Templates. Data. Exchange OS

Database SQL Server SERVER. Framework. Templates. Data. Exchange OS Support Security SQL Server MANAGED I.T. Templates Framework SERVER Apps Network Config Data Exchange OS Load Balance Active Directory Managed I.T. Service Packages Include: DATABASE SUPPORT APPLICATIONS

More information

CLOUD SERVICES FOR EMS

CLOUD SERVICES FOR EMS CLOUD SERVICES FOR EMS Greg Biegen EMS Software Director Cloud Operations and Security September 12-14, 2016 Agenda EMS Cloud Services Definitions Hosted Service Managed Services Governance Service Delivery

More information

CHOOSING A RACKSPACE HOSTING PLATFORM

CHOOSING A RACKSPACE HOSTING PLATFORM CHOOSING A RACKSPACE HOSTING PLATFORM Rackspace has years of experience in hosting and has learnt that the unique needs of our customers businesses often determines the level of accountability and project

More information

CVE-401/CVA-500 FastTrack

CVE-401/CVA-500 FastTrack CVE-401/CVA-500 FastTrack Description The CVE-400-1I Engineering a Citrix Virtualization Solution course teaches Citrix engineers how to plan for and perform the tasks necessary to successfully integrate

More information

Managing and Maintaining Windows Server 2008 Servers

Managing and Maintaining Windows Server 2008 Servers Managing and Maintaining Windows Server 2008 Servers Course Number: 6430A Length: 5 Day(s) Certification Exam There are no exams associated with this course. Course Overview This five day instructor led

More information

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less

SERVICES BRONZE SILVER GOLD PLATINUM. On-Site emergency response time 3 Hours 3 Hours 1-2 Hours 1 Hour or Less SERVICE SUMMARY ITonDemand provides four levels of service to choose from to meet our clients range of needs. Plans can also be customized according to more specific environment needs. SERVICES BRONZE

More information

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led)

Citrix Training. Course: Citrix Training. Duration: 40 hours. Mode of Training: Classroom (Instructor-Led) Citrix Training Course: Citrix Training Duration: 40 hours Mode of Training: Classroom (Instructor-Led) Virtualization has redefined the way IT resources are consumed and services are delivered. It offers

More information

Service Catalog. it s Managed Plan Service Catalog

Service Catalog. it s Managed Plan Service Catalog Service Catalog it s Managed Plan Service Catalog 6/18/2012 Document Contents Contents Document Contents... 2 Overview... 3 Purpose... 3 Product Description... 3 Plan Overview... 3 Tracking... 3 What is

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company

Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company Citrix XenApp Server Deployment on VMware ESX at a Large Multi-National Insurance Company June 2010 TECHNICAL CASE STUDY Table of Contents Executive Summary...1 Customer Overview...1 Business Challenges...1

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

Security Controls for the Autodesk 360 Managed Services

Security Controls for the Autodesk 360 Managed Services Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices

More information

Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options

Hosting Services - Virtual Data Center Service Agreement. 1.0 Terminology. 2.0 Service Description. 3.0 Service Options This Hosting Services Virtual Data Center Service Agreement ( Service Agreement ) sets forth the specific terms and conditions under which LightEdge Solutions, Inc. ( LightEdge ) shall supply certain Services

More information

TekCloud Service Agreement

TekCloud Service Agreement Severity This ( Service Agreement ) is incorporated into the Quote executed by TekLinks and Customer for TekCloud Services and sets forth the specific terms and conditions under which TekLinks shall supply

More information

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב ע"ש ספיר

המרכז ללימודי חוץ המכללה האקדמית ספיר. ד.נ חוף אשקלון 79165 טל'- 08-6801535 פקס- 08-6801543 בשיתוף עם מכללת הנגב עש ספיר מודולות הלימוד של מייקרוסופט הקורס מחולק ל 4 מודולות כמפורט:.1Configuring Microsoft Windows Vista Client 70-620 Installing and upgrading Windows Vista Identify hardware requirements. Perform a clean installation.

More information

EMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager

EMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager EMC Business Continuity for VMware View Enabled by EMC SRDF/S and VMware vcenter Site Recovery Manager A Detailed Review Abstract This white paper demonstrates that business continuity can be enhanced

More information

Appendix C to DIR Contract Number DIR-TSO-2736 SunGard Availability Services Discount Level: 25% Managed Data Center Services - Cloud Hosting

Appendix C to DIR Contract Number DIR-TSO-2736 SunGard Availability Services Discount Level: 25% Managed Data Center Services - Cloud Hosting Resource Pool for ECS/Managed Cloud. Order in 2GB increments. Storage added separately Level: 25% Min RAM Max RAM Cloud Resource Pool (1 GB RAM /.5 vcpu) 1 2 32 26% 2 33 64 26% 3 65 128 26% 4 129 N/A 26%

More information

Managed Security Services SLA Document. Response and Resolution Times

Managed Security Services SLA Document. Response and Resolution Times Managed Security Services SLA Document Appendix A Response and Resolution Times The following table shows the targets of response and resolution times for each priority level: Trouble Priority Response

More information

Cisco Active Network Abstraction Gateway High Availability Solution

Cisco Active Network Abstraction Gateway High Availability Solution . Cisco Active Network Abstraction Gateway High Availability Solution White Paper This white paper describes the Cisco Active Network Abstraction (ANA) Gateway High Availability solution developed and

More information

custom hosting for how you do business

custom hosting for how you do business custom hosting for how you do business 24775 League Island Boulevard Philadelphia PA 19112 gibraltarit.com 866.410.4427 Gibraltar s replicated cloud architecture and PCI/HIPAA compliant data centers provide

More information

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview MEDIAROOM Products Hosting Infrastructure Documentation Introduction The purpose of this document is to provide an overview of the hosting infrastructure used for our line of hosted Web products and provide

More information

CA ARCserve Family r15

CA ARCserve Family r15 CA ARCserve Family r15 Rami Nasser EMEA Principal Consultant, Technical Sales Rami.Nasser@ca.com The ARCserve Family More than Backup The only solution that: Gives customers control over their changing

More information

Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements

Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) provides a holistic Identity Lifecycle

More information

Virtualized Disaster Recovery (VDR) Overview... 2. Detailed Description... 3

Virtualized Disaster Recovery (VDR) Overview... 2. Detailed Description... 3 Service Description Virtualized Disaster Recovery (VDR) Terremark's Virtualized Disaster Recovery (VDR) service is a fully managed replication and Disaster Recovery (DR) service, where Terremark provides

More information